Jaint: A Framework for User-Defined Dynamic Taint-Analyses based on Dynamic Symbolic Execution of Java Programs
dc.contributor.author | Mues, Malte | |
dc.contributor.author | Schallau, Till | |
dc.contributor.author | Howar, Falk | |
dc.contributor.editor | Koziolek, Anne | |
dc.contributor.editor | Schaefer, Ina | |
dc.contributor.editor | Seidl, Christoph | |
dc.date.accessioned | 2020-12-17T11:57:54Z | |
dc.date.available | 2020-12-17T11:57:54Z | |
dc.date.issued | 2021 | |
dc.description.abstract | We summarize the paper "Jaint: A Framework for User-Defined Dynamic Taint-Analyses Based on Dynamic Symbolic Execution of Java Programs", published at the sixteenth international conference on integrated formal methods in November 2020. Reliable and scalable methods for security analyses of Java applications are an important enabler for a secure digital infrastructure. In this paper, we present a security analysis that integrates dynamic symbolic execution and dynamic multi-colored taint analysis of Java programs, combining the precision of dynamic analysis with the exhaustive exploration of symbolic execution. We implement the approach in the Jaint tool, based on Jdart, a dynamic symbolic execution engine for Java PathFinder, and evaluate its performance by comparing precision and runtimes to other research tools on the OWASP benchmark set. The paper also presents a domain-specific language for taint analyses that is more expressive than the source and sink specifications found in publicly available tools and enables precise, CWE-specific specification of undesired data flows. This summary presents Jaint’s language and the evaluation. | en |
dc.identifier.doi | 10.18420/SE2021_27 | |
dc.identifier.isbn | 978-3-88579-704-3 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/34522 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Software Engineering 2021 | |
dc.relation.ispartofseries | ecture Notes in Informatics (LNI) - Proceedings, Volume P-310 | |
dc.subject | Dynamic Symbolic Execution | |
dc.subject | Domain Specific Languages | |
dc.subject | Java Bytecode Analysis | |
dc.subject | Dynamic Taint Analysis | |
dc.title | Jaint: A Framework for User-Defined Dynamic Taint-Analyses based on Dynamic Symbolic Execution of Java Programs | en |
dc.type | Text/ConferencePaper | |
gi.citation.endPage | 78 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 77 | |
gi.conference.date | 22.-26. Februar 2021 | |
gi.conference.location | Braunschweig/Virtuell |
Dateien
Originalbündel
1 - 1 von 1